Most Viewed Content:

Google to bring PWA application backup & restore function for Chrome/android

According to thespAndroid reports, GitHub's Chromium repository recently added...

Microsoft working on new features for Win11 / Win12: smart notifications, depth-of-field effects

According to the source Albacore (@thebookisclosed), Microsoft is preparing...

Toyota responds to continued production cuts in the next 3 months: easing pressure on dealer earnings

In response to the news that "production will continue...

Data of more than 5 million people worldwide is for sale on bot marketplace

Lithuania Nord Security company research report pointed out that more than 5 million people in the world after the theft of data on the botnet for sale. The most serious impact is in India, where 600,000 Indian accounts are being sold on botnets for an average of 490 rupees per account (about $41.49).

The stolen data included user login credentials, cookies, digital fingerprints, screenshots, and other related information, the report said. The company studied three bot marketplaces, Genesis Market, Russian Market and 2Easy, and found that the stolen information came from Google, Microsoft and Facebook accounts.

Lithuania’s Nord Security said: “The difference between the robot market and other darknet markets is that they can get a lot of data about a person in one place. And after the robot is sold, they promise the buyer that as long as the victim’s Devices are infected by bots, and their information is constantly updated.”

The researchers found 667 million cookies, 81,000 digital fingerprints, 538,000 auto-filled forms, and numerous device screenshots and webcam snaps in their study.

Digital robots are becoming more and more commonplace. They play a role in areas such as customer service, search engine optimization, and entertainment. However, not all bots are safe and sound, and many of them can be malicious. Hackers are selling malware bot logs on various bot marketplaces, posing an unimaginable threat.

Once the malware is installed on the victim’s computer, it creates a thief’s log or file into which all stolen data is collected. A virus is like a well-trained dog that sniffs around a computer, detecting valuable information about the victim and its hardware. Using all the stolen data, a person’s digital identity can be created.

Latest

Starting from 48,900, Geely Panda Karting officially starts pre-sale

Geely Panda Karting officially started pre-sale. The pre-sale price...

Ford: Expand charging network, fuel/ hybrid/ pure electric in parallel

Recently, Ford released the company's comprehensive annual report for...

Chery’s two new cars are exposed, targeting overseas markets

Recently, some media exposed the actual cars of two...

New Trumpchi Shadow Leopard to launch on May 1, upgraded performance rims

Recently, we learned from the official that the 2024...

Newsletter

Don't miss

Starting from 48,900, Geely Panda Karting officially starts pre-sale

Geely Panda Karting officially started pre-sale. The pre-sale price...

Ford: Expand charging network, fuel/ hybrid/ pure electric in parallel

Recently, Ford released the company's comprehensive annual report for...

Chery’s two new cars are exposed, targeting overseas markets

Recently, some media exposed the actual cars of two...

New Trumpchi Shadow Leopard to launch on May 1, upgraded performance rims

Recently, we learned from the official that the 2024...

Samsung Galaxy S25 Ultra expected to feature 5000mAh + 45W Combo

Technology media WccFtech recently reported that Samsung will not...
James Lopez
James Lopezhttps://www.techgoing.com
James Lopez joined Techgoing as Senior News Editor in 2022. He's been a tech blogger since before the word was invented, and will never log off.